{"id":578,"date":"2009-10-27T19:08:42","date_gmt":"2009-10-27T11:08:42","guid":{"rendered":"http:\/\/localhost\/portal\/2009\/10\/27\/voip\/"},"modified":"2009-10-27T19:08:42","modified_gmt":"2009-10-27T11:08:42","slug":"voip","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=578","title":{"rendered":"\u624b\u6a5f\u6253 VoIP \u96fb\u8a71\u5bb9\u6613\u906d\u7aca\u807d"},"content":{"rendered":"<p>\nUCSniff\u7684\u4f7f\u7528\u8005\u4ecb\u9762\uff0c\u7528\u6236\u53ef\u76e3\u807d\u901a\u8a71\uff0c\u6216\u8005\u64f7\u53d6IP-based\u5f71\u50cf\u96fb\u8a71\u7684\u756b\u9762\u3002<\/p>\n<p>\u65e5\u671f\uff1a2009\/10\/26\u00a0 \u00a0\u2027\u4f5c\u8005\uff1a<a href=\"http:\/\/3c.msn.com.tw\/View.aspx?ArticleID=36807\" target=\"_blank\" rel=\"noopener\">ZDNet\u65b0\u805e\u5c08\u5340<\/a>\uff1aElinor Mills<\/p>\n<p>\n<img loading=\"lazy\" decoding=\"async\" height=\"316\" width=\"408\" src=\"http:\/\/i.i.com.com\/cnwk.1d\/i\/bto\/20091023\/UCSniff_610x381.png\" alt=\"alt\" \/><\/p>\n<p>\u4f60\u7528Wi-Fi\u6216IP\u5f71\u50cf\u624b\u6a5f\u6253\u7db2\u8def\u96fb\u8a71(VoIP)\u55ce\uff1f\u52d9\u5fc5\u5c0f\u5fc3\uff0c\u56e0\u70ba\u7814\u7a76\u54e1\u5468\u672b\u7684\u793a\u7bc4\u8b49\u5be6\uff0c\u4ed6\u5011\u53ef\u4ee5\u7aca\u807d\u5225\u4eba\u7528iPhone\u624b\u6a5f\u900f\u904eWi-Fi\u7db2\u8def\u9032\u884c\u7684IP\u901a\u8a71\uff0c\u6216\u5728\u5169\u652fIP\u5f71\u50cf\u96fb\u8a71\u4e4b\u9593\u9032\u884c\u7684\u5f71\u97f3\u901a\u8a0a\u3002<\/p>\n<p>\u9019\u7a2e\u5c45\u4e2d\u7aca\u807d\u5f0f\u7684\u653b\u64ca\u4e26\u4e0d\u662f\u65b0\u82b1\u6a23\uff0c\u4f46\u5728\u9019\u4e9b\u7279\u5b9a\u7684\u5e73\u53f0\u4e0a\u516c\u958b\u5c55\u793a\uff0c\u5012\u662f\u982d\u4e00\u906d\u3002<\/p>\n<p>Sipera Systems\u516c\u53f8Viper Lab\u4e3b\u7ba1Jason Ostrom\u5468\u516d\u5728\u8056\u5730\u7259\u54e5ToorCon\u7684\u4e00\u5834VoIP\u6703\u8b70\u4e0a\uff0c\u5c55\u793a\u82e5\u7528iPhone\u624b\u6a5f\u900f\u904e\u4e0d\u5b89\u5168\u7684\u7121\u7dda\u7db2\u8def\u8ac7\u8a71\uff0c\u53ef\u80fd\u906d\u5230\u7b2c\u4e09\u8005\u7aca\u807d\u3002Ostrom\u7684\u7bc4\u672c\u7a0b\u5f0f(exploit)\u653b\u64ca\u7684\u76ee\u6a19\uff0c\u662f\u4f7f\u7528SIP (session initiation protocol) for VoIP\u7684\u667a\u6167\u578b\u624b\u6a5f\u3002<\/p>\n<p>Ostrom\u4f7f\u7528\u4e00\u7a2e\u7a31\u70ba\u300cUCSniff\u300d\u7684\u958b\u653e\u539f\u59cb\u78bc\u8a55\u4f30\u5de5\u5177\uff0c\u4f86\u7aca\u807d\u4e26\u9304\u4e0b\u5225\u4eba\u7684\u96fb\u8a71\u4ea4\u8ac7\u5167\u5bb9\u3002\u65b0\u7248\u7684\u5de5\u5177\u5728\u5468\u516d\u5c0d\u5916\u767c\u5e03\u3002<\/p>\n<p>\u53e6\u5916\uff0cOstrom\u4e5f\u793a\u7bc4\u5982\u4f55\u767c\u52d5\u653b\u64ca\uff0c\u4ee5\u4fbf\u5373\u6642\u8b80\u53d6\u3001\u7aca\u807dIP\u5f71\u50cf\u96fb\u8a71\u901a\u8a71\u4e2d\u5448\u73fe\u7684\u5f71\u7247\u548c\u8072\u97f3\u3002<\/p>\n<p>\u4eca\u5e747\u6708\u6642\uff0cOstrom\u5728Defcon\u793a\u7bc4\u5982\u4f55\u900f\u904e\u653b\u64ca\uff0c\u7aca\u807d\u8996\u8a0a\u6703\u8b70\u901a\u8a71\uff0c\u4e26\u6514\u622a\u76e3\u8996\u651d\u5f71\u6a5f\u62cd\u4e0b\u7684\u5f71\u50cf\u3002\u8a72\u516c\u53f8\u884c\u92b7\u66a8\u7522\u54c1\u7ba1\u7406\u526f\u7e3d\u88c1Adam Boone\u8aaa\uff0c\u672c\u5468Sipera Systems\u5c07\u5ba3\u5e03\u65b0\u7684\u5b89\u5168\u7522\u54c1\uff0c\u5354\u52a9\u9632\u7bc4\u900f\u904eWi-Fi\u7db2\u8def\u5c0d\u667a\u6167\u624b\u6a5f\u9032\u884c\u7684VoIP\u653b\u64ca\u3002(\u5510\u6167\u6587\u8b6f)<\/p>\n<p><a href=\"http:\/\/tw.webmaster.yahoo.com\/\"><img decoding=\"async\" border=\"0\" src=\"http:\/\/tw.img.webmaster.yahoo.com\/108667\/ystats.gif\" alt=\"alt\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>UCSniff\u7684\u4f7f\u7528\u8005\u4ecb\u9762\uff0c\u7528\u6236\u53ef\u76e3\u807d\u901a\u8a71\uff0c\u6216\u8005\u64f7\u53d6IP-based\u5f71\u50cf\u96fb\u8a71\u7684\u756b\u9762\u3002 \u65e5\u671f\uff1a2009\/10\/2 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-578","post","type-post","status-publish","format-standard","hentry","category-informationsecurity"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/578","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=578"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/578\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=578"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=578"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=578"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}